Logo
job logo

Cybersecurity Analyst

Graham Personnel Services, High Point, NC, United States


Job Description

The Cybersecurity Analyst is responsible for protecting the organization's information systems and sensitive data from cyber threats. This role involves monitoring security systems, identifying vulnerabilities, responding to incidents, and ensuring compliance with regulatory requirements such as HIPAA and other data protection standards.

Key Responsibilities Monitor network traffic, security logs, and alerts for suspicious activity Identify, analyze, and respond to cybersecurity incidents in a timely manner Conduct vulnerability assessments and risk analyses Implement and manage security tools (e.g., firewalls, intrusion detection systems, endpoint protection) Support incident response and forensic investigations Ensure compliance with security policies, standards, and regulations (e.g., HIPAA) Perform regular system audits and security testing Assist with disaster recovery and business continuity planning Educate staff on security awareness and best practices Maintain documentation of security incidents, procedures, and controls Required Qualifications

Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field (or equivalent experience) 2-5 years of experience in cybersecurity or IT security roles Knowledge of security frameworks (e.g., NIST, ISO 27001) Experience with security tools such as SIEM, antivirus, and intrusion detection systems Understanding of networking concepts, protocols, and system administration Familiarity with regulatory compliance (HIPAA preferred for healthcare environments) Preferred Certifications

CompTIA Security+ Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) Certified Information Security Manager (CISM) Key Skills & Competencies

Strong analytical and problem-solving skills Attention to detail and risk awareness Ability to work under pressure during security incidents Excellent communication and documentation skills Knowledge of threat detection and mitigation strategies Understanding of access control models and encryption

#DHIR26

Meet Your Recruiter

Amber Richards